International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 115 | Views: 174

M.Tech / M.E / PhD Thesis | Computer Science & Engineering | India | Volume 5 Issue 5, May 2016


Data hiding Using Texture Synthesis with Watermarking

Aruna M P | Maya Mathew


Abstract: Data hiding ensures entire data access to users and protects data integrity by preventing unintended or intended changes. One of the data hiding method, steganography, is used for communicating secret data using appropriate multimedia carrier such as image, audio, and video files. The goal of steganography is to hide information in such a way that existence of communication is unknown by an attacker. This paper proposes a novel approach for steganography using reversible texture synthesis. It converts an image into texture image for steganography texture synthesis process. By consider this texture image as a source image for doing steganography method. A texture synthesis process resamples a smaller texture image, which synthesizes a new texture image with a similar local appearance and an arbitrary size. This paper makes the texture synthesis process into steganography for concealing secret messages. This algorithm conceals the source texture image and embeds secret messages using the process of texture synthesis. This allows us to extract the secret messages as well as source texture from a stego synthetic texture. This approach has some advantages. First, this scheme offers the embedding capacity that is proportional to the size of the stego texture image. Second, the reversible capability inherited from this scheme provides functionality, which allows recovery of the source texture. Then, apply a water marking method. This will help whether a given sender is authorised person or not.


Keywords: texture synthesis, data hiding, steganography, watermarking, and texture image


Edition: Volume 5 Issue 5, May 2016,


Pages: 2420 - 2425


How to Download this Article?

Type Your Valid Email Address below to Receive the Article PDF Link


Verification Code will appear in 2 Seconds ... Wait

Top